Skip to content

Conversation

@Naquiao
Copy link
Member

@Naquiao Naquiao commented Aug 28, 2025

No description provided.

Naquiao and others added 4 commits July 30, 2025 16:56
…ic shipping options, promo code section, and improved order summary display
…te promo codes to include a new 50% discount option.
@vercel
Copy link

vercel bot commented Aug 28, 2025

The latest updates on your projects. Learn more about Vercel for GitHub.

Project Deployment Preview Comments Updated (UTC)
bugster-nextjs-example Ready Ready Preview Comment Aug 28, 2025 7:45pm

@bugster-dev
Copy link

bugster-dev bot commented Aug 28, 2025

✅ Bugster - E2E Results

Status: SUCCESS
Summary: All tests passed successfully

Test Results: 8/8 tests passed

View detailed results

@bugster-dev
Copy link

bugster-dev bot commented Aug 28, 2025

❌ Bugster - Destructive Results

Status: FAILURE
Summary: Some bugs found during execution

Destructive Run Results: 14 bugs found in 6 sessions

Bugs Found:

  • Hardcoded Promo Code Validation (Page: app/cart/page.tsx)
    • The promo code validation uses a hardcoded object with only 'BUGSTER50' as valid. This suggests incomplete implementation and potential for bypass through client-side manipulation.
  • Client-Side Price Calculation Vulnerability (Page: app/cart/page.tsx)
    • Product prices are hardcoded in client-side JavaScript (productPrices object), making them vulnerable to manipulation. Malicious users could modify prices before checkout.
  • Simulated API Call Without Backend Validation (Page: app/cart/page.tsx)
    • The promo code validation uses setTimeout to simulate an API call but processes validation entirely on the client-side, allowing potential bypass of server-side validation.
  • Race Condition in Promo Code Application (Page: app/cart/page.tsx)
    • The loading state management may allow race conditions if users rapidly submit promo codes, potentially allowing multiple codes to be applied simultaneously.
  • Missing Input Sanitization (Page: app/cart/page.tsx)
    • The promo code input only uses basic trim() and toUpperCase() sanitization, lacking protection against XSS or injection attacks before processing.

...and 9 more bugs. View all bugs in detailed results

View detailed results

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants